Filters
Question type

Study Flashcards

One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following practice IS permissible under a single-user license agreement?


A) Ahmed rents his copy of Adobe Illustrator.
B) The lab administrator at the college installs Fireworks on the school computer lab network.
C) Karen installs Flash on one desktop computer and one notebook computer.
D) Perry gives a copy of Microsoft Word 2013 to his friend, while continuing to use the software.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Discuss the four types of software theft.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

What term is used to describe the process of restricting access to certain material on the web?


A) content filtering
B) information monitoring
C) data mining
D) social profiling

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

A) True
B) False

Correct Answer

verifed

verified

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?


A) CAN-SPAM Act
B) Computer Abuse Amendments Act
C) COPPA
D) Electronic Communication Privacy Act

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A(n) ____________________ agreement is the right to use software.

Correct Answer

verifed

verified

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

A) True
B) False

Correct Answer

verifed

verified

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?


A) ENERGY STAR
B) SECURE ELECTRONICS
C) ACCEPTABLE USE
D) GREEN COMPUTING

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?


A) rebuking
B) spoofing
C) transmitting
D) victimizing

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

FOIA enables public access to most government records.

A) True
B) False

Correct Answer

verifed

verified

Into which of the following kinds of ports do external fingerprint readers plug?


A) parallel
B) MIDI
C) USB
D) serial

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following statements is not true about Internet and network attacks?


A) No central administrator is present on the Internet.
B) It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
C) Information kept on an organization's premises has a higher security risk than information transmitted over networks.
D) Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If a program or device has a default password, be sure to retain it.

A) True
B) False

Correct Answer

verifed

verified

Perpetrators of back doors trick their victims into interacting with phony websites.

A) True
B) False

Correct Answer

verifed

verified

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?


A) distributed
B) delayed
C) limited
D) staggered

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?


A) digital security risk
B) information liability
C) technical terrorism
D) network compromise

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

If you are nervous, a signature might not match the one on file in a signature verification system.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.

Correct Answer

verifed

verified

denial of service,Do...

View Answer

Analog signatures help to prevent email forgery.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 181

Related Exams

Show Answer